Klynveld Peat Marwick Goerdeler

Slides:



Advertisements
Similar presentations
CSEP Copyright (c) 2008 by INCOSE, subject to the restrictions the copyright slide, INCOSE Copyright Notice. SE Handbook V3.1 Tutorial Agenda, 4 August.
Advertisements

HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
World Health and Sustainability
INCOSE Systems Engineering Professional (SEP) Program 1 © International Council on Systems Engineering Subject to the restrictions on Copyright.
The International Security Standard
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
INCOSE Systems Engineering Professional (SEP) Program Program Statistics as of February SEP Program Statistics © International Council.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
LOGO Accounting information system A Business process approach FREDERICK L. JONES DASARATHA V. RAMA Jones Rama.
Standards and Guidelines for Web Page Publishing December 9, 2009.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
HIPAA PRIVACY AND SECURITY AWARENESS.
CSCI 101 R 3:30 Dr. Garrison.  What is software? ◦ Set of computer programs that tells the computer what to do and enables it to perform different tasks.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
ADVISORY What do CIOs need for Career Progression? 18 th May 2005 Kumar Parakala, Global Chief Operating Officer, IT Advisory, KPMG 8 May 2007, Sydney,
How Satisfied Employees Are Motivated To Be Productive.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What is MediaCAST. MediaCAST is an on-demand learning platform purchased by the CCSD to enhance the delivery of lessons in the classroom. The system provides.
Why Not Qualified?. Importance of Big Four  Quick experience  Looks great on resume.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Update on Saudi Zakat & Income Tax Laws ICAP – KSA Chapter 27 January 2014.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
HUMAN RESOURCE MANAGEMENT PRESENTATION ON SELECTION PROCESS AT KPMG.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Trade Compliance Considerations April 13, © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Marketing Jeopardy Free Enterprise Types of Businesses
Connectivity to bank and sample account structure
Prince Mohammad Bin Fahd University Spring MISY 3321 Intro to Information Assurance Mr. Muhammad Rafiq Group Presentation 1 10th March, 2013.
Aramco Information Assurance Policy
Rawabi Holding Company Information Assurance
Apple (information Assurance Policy)
Intro. Information Assurance (Assignment#1)
Al-Ahli Commercial Bank
Reid Cushman, UM Ethics Programs
Florida Information Protection Act of 2014 (FIPA)
MISY3321- Intro. to Information Assurance
Understanding HIPAA Dr. Jennifer Lu.
E&O Risk Management: Meeting the Challenge of Change
Chapter 5 Electronic Commerce | Security
Florida Information Protection Act of 2014 (FIPA)
Information Security: Risk Management or Business Enablement?
Automation in an XML Authoring Environment
Chapter 5 Electronic Commerce | Security
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Office of Information Security
INFORMATION SYSTEMS SECURITY and CONTROL
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Motivation for 36OU Open Rack
IP and legal issues Super-project.eu.
INCOSE Systems Engineering Professional (SEP) Program
PRESENTATION OF MONTENEGRO
Cyber Security: What the Head & Board Need to Know
INCOSE Systems Engineering Professional (SEP) Program
Future of Charities and Tax – a Māori Perspective
Strategies to Comply with the HPAA Privacy Rule Before the HIPAA Security and Enforcement Rules are Final Presented by: Steven S. Lazarus, PhD, FHIMSS.
Standards Aware Course Review
Protecting Yourself from Fraud including Identity Theft
Emotional Intelligence: The Core of Family Offices
Professional services in papua new guinea
One relationship. Many resources for business owners.
Presentation transcript:

Klynveld Peat Marwick Goerdeler   Klynveld Peat Marwick Goerdeler Introduction to Information Assurance Instructor: Dr. Mohammad Rafiq Group Members: Amnah Al-Khabaz 200901615 Fatimah Al-Jomaie 200800688 Zahra AL-Alfaraj 200700627

Outline Introduction / History of KPMG Types of information it keeps Organization Information Assurance Policy Lost or miss use of Information Recommendations

introduction / History of KPMG Assuring information has become one of the important issues that all organizations and companies concern about. KPMG is a global network of professional firms providing audit, tax and advisory services. KPMG is one of the largest professional services networks in the world. Saudi Arabia as many other countries has a KPMG Branch. KPMG has operated in Saudi Arabia since 1992, having offices in Riyadh, Jeddah and Al Khobar. During the last four years KPMG in Saudi Arabia has become one of the fastest growing professional services firms in the country.

Types of Information The most important information that KPMG keeps are personal information and organizational information. organizational information includes the information that is related to assurance, tax, and financial advisory services, strategy or business planning, operational and financial performance. It also covers the information that is related to accounting, auditing, internal audit, personal financial planning, financial services, software and electronics.

Information Assurance Policy KPMG is not responsible about any uncertain viruses, without delay or error free. KPMG does not guarantee any information that are posted in the website Using the materials should be restricted for personal or non-commercial use only, users should retain all copyright, trademark or other notices. Using the materials for commercial purposes should be supported by explicit written permission from the author. No one is permitted to use KPMG logo without taking a license agreement from KPMG international or a member firm. KPMG is not responsible about the content of any third- party links and it has the right to remove any link if it will harm its reputation. Information Assurance Policy

Lost or Miss Use of Information Breakdowns in security might cause losses of thousands of dollars and losses of important data and information. KPMG lost an important flash driver with protected health information of 3,630 people of Saint Barnabas Health Care. This situation opened the door for KPMG to encrypt its information and avoid any similar incident.

Recommendations KPMG must try to develop more effective ways to secure its information and install strong software and security systems that will provide a much safer network. Recruit expert people who have the ability to protect KPMG Company and who can mimic the newest techniques to avoid any problem.